Official code for the paper entitled "Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks"
☆31Apr 15, 2025Updated 11 months ago
Alternatives and similar repositories for MalPurifier
Users that are interested in MalPurifier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Apr 4, 2021Updated 4 years ago
- adversarial malware detection via a principled way☆24Apr 27, 2023Updated 2 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆58Mar 24, 2023Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 4 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Nov 30, 2021Updated 4 years ago
- ☆43Aug 6, 2021Updated 4 years ago
- A curated list of malware-related papers.☆34Feb 28, 2024Updated 2 years ago
- Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?☆14Aug 24, 2022Updated 3 years ago
- TDSC 2022 | An explainable GNN-based Android malware detection system in paper "MsDroid: Identifying Malicious Snippets for Android Malwa…☆66Feb 21, 2024Updated 2 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- Universal Robustness Evaluation Toolkit (for Evasion)☆32Sep 17, 2025Updated 6 months ago
- Traffic-Analysis-Base-DPDK☆141Apr 2, 2025Updated 11 months ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- A Federated Learning based Android Malware Classification System☆28Feb 15, 2024Updated 2 years ago
- MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis☆45Apr 24, 2020Updated 5 years ago
- ☆16Jun 22, 2022Updated 3 years ago
- ☆11Jul 2, 2025Updated 8 months ago
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Papers, code and datasets about deep learning for Android malware defenses and malware detection☆148Nov 21, 2023Updated 2 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- ☆14Feb 5, 2024Updated 2 years ago
- Zero Trust Bitcoin Options on Ethereum☆12Jun 4, 2021Updated 4 years ago
- Framework for testing the reachability of native functions in Android applications.☆11Aug 30, 2023Updated 2 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- The dataset, source code and the results of our ESEC/FSE 2023 paper "An Extensive Study on Adversarial Attack against Pre-trained Models …☆15Feb 19, 2024Updated 2 years ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆28Nov 23, 2022Updated 3 years ago
- 重庆大学新教务网成绩查询,单点登录☆11Mar 7, 2024Updated 2 years ago
- A Query Efficient Natural Language Attack in a Black Box Setting☆17Sep 23, 2021Updated 4 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- ☆11Feb 19, 2024Updated 2 years ago
- A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments☆14Apr 2, 2024Updated last year
- 将大容量PCAP按流切分成小PCAP☆24Jun 6, 2023Updated 2 years ago
- 把一整年的微信聊天记录,生成一份可滚动、可分享的年度报告 - Generate a Spotify Wrapped-style annual report from your WeChat chat history.☆38Jan 25, 2026Updated last month
- ☆13Dec 30, 2021Updated 4 years ago
- Triangle Attack: A Query-efficient Decision-based Adversarial Attack (ECCV 2022)☆16Jul 19, 2022Updated 3 years ago
- Authentication and authorization tokens designed specifically for use with zero-trust microservices.☆17Nov 22, 2020Updated 5 years ago
- A neural approach to malware detection in portable executables☆81Mar 20, 2023Updated 3 years ago
- Adversarial Attack on Graph Neural Networks as An Influence Maximization Problem☆20Oct 27, 2021Updated 4 years ago
- Android Malware Detection with Graph Convolutional Networks using Function Call Graph and its Derivatives.☆40Aug 2, 2021Updated 4 years ago